• Title/Summary/Keyword: External Threats

Search Result 141, Processing Time 0.03 seconds

Identification and risk management related to construction projects

  • Boughaba, Amina;Bouabaz, Mohamed
    • Advances in Computational Design
    • /
    • v.5 no.4
    • /
    • pp.445-465
    • /
    • 2020
  • This paper presents a study conducted with the aim of developing a model of tendering based on a technique of artificial intelligence by managing and controlling the factors of success or failure of construction projects through the evaluation of the process of invitation to tender. Aiming to solve this problem, analysis of the current environment based on SWOT (Strengths, Weaknesses, Opportunities, and Threats) is first carried out. Analysis was evaluated through a case study of the construction projects in Algeria, to bring about the internal and external factors which affect the process of invitation to tender related to the construction projects. This paper aims to develop a mean to identify threats-opportunities and strength-weaknesses related to the environment of various national construction projects, leading to the decision on whether to continue the project or not. Following a SWOT analysis, novel artificial intelligence models in forecasting the project status are proposed. The basic principal consists in interconnecting the different factors to model this phenomenon. An artificial neural network model is first proposed, followed by a model based on fuzzy logic. A third model resulting from the combination of the two previous ones is developed as a hybrid model. A simulation study is carried out to assess performance of the three models showing that the hybrid model is better suited in forecasting the construction project status than RNN (recurrent neural network) and FL (fuzzy logic) models.

Privacy-Preserving Self-Certified Public Auditing for Secure Cloud Storage (안전한 클라우드 스토리지를 위한 프라이버시 보장 자체 인증 공공 감사)

  • Baek, Mokryeon;Kim, Dongmin;Jeong, Ik Rae
    • Journal of KIISE
    • /
    • v.43 no.4
    • /
    • pp.497-508
    • /
    • 2016
  • With a cloud storage service, data owners can easily access their outsourced data in cloud storage on different devices and at different locations, and can share their data with others. However, as the users no longer physically have possession of their outsourced data and the cloud still facing the existence of internal/external threats, the task of checking the data integrity is formidable. Over recent years, numerous schemes have been proposed to ensure data integrity in an untrusted cloud. However, the existing public auditing schemes use a third-party auditor(TPA) to execute high computation to check data integrity and may still face many security threats. In this paper, we first demonstrate that the scheme proposed by Zhang et al. is not secure against our two threat models, and then we propose a self-certified public auditing scheme to eliminate the security threats and guarantee a constant communication cost. Moreover, we prove the securities of our public auditing scheme under three security models.

A Study on Security Requirments Analysis through Security Threat Modeling of Home IoT Appliance (Home IoT 가전의 보안위협모델링을 통한 보안요구사항 분석에 관한 연구)

  • Yun, Suk-Jin;Kim, Jungduk
    • The Journal of Society for e-Business Studies
    • /
    • v.24 no.2
    • /
    • pp.113-124
    • /
    • 2019
  • Today many companies are offering IoT-enabled products and place emphasis on security from the planning stage to protect their products and user information from external threats. The present security levels, however, remain low because the time and resources invested in developing security requirements for each device are far from enough to meet the needs of a wide range of IoT products. Nevertheless, vulnerabilities of IoT devices have been reported continuously, which calls for more detailed security requirements for home IoT devices. In this context, this research identified threats of home IoT systems by using Microsoft Threat Modeling Tool. It then suggested measures to enhance the security of home IoT devices by developing security assessment items through comparative analysis of the identified threats, domestic and global vulnerability assessment standards and related research. It also verified the effectiveness of the developed security requirements by testing them against the existing ones, and the results revealed the security requirements developed in this research proved to be more effective in identifying vulnerabilities.

Development of Security Anomaly Detection Algorithms using Machine Learning (기계 학습을 활용한 보안 이상징후 식별 알고리즘 개발)

  • Hwangbo, Hyunwoo;Kim, Jae Kyung
    • The Journal of Society for e-Business Studies
    • /
    • v.27 no.1
    • /
    • pp.1-13
    • /
    • 2022
  • With the development of network technologies, the security to protect organizational resources from internal and external intrusions and threats becomes more important. Therefore in recent years, the anomaly detection algorithm that detects and prevents security threats with respect to various security log events has been actively studied. Security anomaly detection algorithms that have been developed based on rule-based or statistical learning in the past are gradually evolving into modeling based on machine learning and deep learning. In this study, we propose a deep-autoencoder model that transforms LSTM-autoencoder as an optimal algorithm to detect insider threats in advance using various machine learning analysis methodologies. This study has academic significance in that it improved the possibility of adaptive security through the development of an anomaly detection algorithm based on unsupervised learning, and reduced the false positive rate compared to the existing algorithm through supervised true positive labeling.

Studies of the possibility of external threats of the automotive ECU through simulation test environment (자동차용 ECU의 CAN 메시지를 통한 자동차 공격 방법 연구)

  • Lee, Hye-Ryun;Kim, Kyoung-Jin;Jung, Gi-Hyun;Choi, Kyung-Hee;Park, Seung-Kyu;Kwon, Do-Keun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.11
    • /
    • pp.39-49
    • /
    • 2013
  • In this paper, security mechanism of internal network(CAN) of vehicle is a very incomplete state and the possibility of external threats as a way to build a test environment that you can easily buy from the market by the vehicle's ECU(Electric Control Unit) to verify and obtain a CAN message. Then, by applying it to ECU of the real car to try to attack is proposed. A recent study, Anyone can see plain-text status of the CAN message in the vehicle. so that in order to verify the information is vulnerable to attack from outside, analyze the data in a vehicle has had a successful attack, but attack to reverse engineering in the stationary state and buying a car should attempt has disadvantages that spatial, financial, and time costs occurs. Found through the car's ECU CAN message is applied to a real car for Potential threats outside of the car to perform an experiment to verify and equipped with a wireless network environment, the experimental results, proposed method through in the car to make sure the attack is possible. As a result, reduce the costs incurred in previous studies and in the information absence state of the car, potential of vehicle's ECU attack looks.

The threats and responses of cyber-terrorism in a new security environment: Issues and propositions on strategic frameworks (새로운 안보환경을 둘러싼 사이버 테러의 위협과 대응방안: 쟁점들과 전략적 접근 틀에 대한 논의)

  • Yun, Min-Woo
    • Korean Security Journal
    • /
    • no.40
    • /
    • pp.109-145
    • /
    • 2014
  • Despite much discussions on cyber-terrorism in South Korea, several missing issues could be addressed. This paper attempts to deal with such missing but important issues. In South Korea, there has been little attentions on cyber-terrorism with the respects of national security strategy development under macro framework responding to future security environment. This article focuses on such issues. In other words, the purpose of this paper evaluates the meaning of national security threats raised from cyber-terrorism as a mode of security threats and proposes the matter of cyber-terrorism within the development of national security strategy in the future security environment. several issues in this discussion pass some important messages for the construction of national security strategic approach framework within the future security environment adding cyber-space. in the future environment, a new space called cyber is added as an important external condition which might determine the security of individuals, societies, and nations. Therefore, the fundamental strategic framework should be prepared. After that, the trend and direction of future technological advancement should be understood and the identity, nature, and types of threat should be analyzed. Also, after that, various responses and countermeasures are together constituted in the aspect of function and system regarding various anticipated threats of the future human society including cyber-terrorism.

  • PDF

Design and Embodiment in Home Network at Gateway is Stabilization MSAC (Home Network 게이트웨이에서 효율적인 MSAC 설계 및 구현)

  • Yoon, Woon-Kwan;Choi, Kyong-Ho;J. Kim, Kui-Nam
    • Convergence Security Journal
    • /
    • v.6 no.1
    • /
    • pp.105-110
    • /
    • 2006
  • Home Gateway which composes Home network in Ubiquitous Computing environment is an equipment to provide the connection with the external Internet Physically, and it carry out the role which communication, control and monitor is important. But Home gateway has potential threats because it connected on external Internet as spillage user's information from outside wrongdoers. Consequently, Home gateway has to have security module and structure for the communication which is sate. In this research paper, We designed Home gateway security structure for the communication which is protected when computer user use the computer from the outside to home to send information or important data.

  • PDF

Conceptual Development of Workplace Bullying: Focusing on Hospital Nurses (직장 내 괴롭힘 개념 개발: 병원간호사를 중심으로)

  • Lee, Younju;Lee, Eun Jin
    • Korean Journal of Health Education and Promotion
    • /
    • v.31 no.1
    • /
    • pp.57-70
    • /
    • 2014
  • Objectives: The purpose of this study was to build a conceptual framework of bullying in nursing workplace. Methods: A comprehensive literature review was conducted to identify concepts in relation to bullying in nursing workplace by searching research articles published between 1995 and 2013. In-depth interviews were performed with 14 nurses who experienced bullying at work. The Hybrid Model was applied for concept analysis which led to identify attributes of bullying in nursing workplace. Results: The antecedents of bullying in nursing workplace were offenders, victims, and administrators. They create negative effects on organizational culture and imbalance of power between authority and subordinate workers in the organization. Bullying in nursing workplace that occurred in the forms of inefficient organizational culture, imbalance of power, and the vulnerability of individual or individuals and groups of individuals formed an unstable dynamic. It is expressed as verbal and nonverbal bullying, work-related bullying, and external threats. Consequently, workplace bullying causes physical and psychological withdrawal and increased negative energy in an organization. Conclusions: Workplace bullying consisted of verbal abuse, alienation, unreasonable work processes, restriction on work-related rights, and external threat.

Establish Company's Response Strategy by Revision Product Liability Law through Delphi-SWOT Method (Delphi-SWOT 분석을 이용한 제조물책임법 개정에 따른 기업의 대응전략 수립)

  • Seo, JunHyeok;Bae, SungMin
    • Journal of Korean Society for Quality Management
    • /
    • v.46 no.4
    • /
    • pp.911-922
    • /
    • 2018
  • Purpose: This study provides an overview of the Product Liability Act which was revised in 2017 and took effect in 2018. It analyzes the effects of the revised Act on corporate management from internal and external perspectives to present coping strategies so that companies can synthetically respond to such effects. Methods: In order to achieve the purpose of this study, experts like companies, academia, governmental institutions, and consultants were invited, and Delphi techniques were applied to derive means, standard deviations, and Content Validity Ratio. Results: In this study, based on two expert questionnaire surveys, strengths and weaknesses of the internal environment of companies and opportunities and threats of the external environment were derived, followed by provision of S/O, W/O, S/T, and W/T strategies. Conclusion: To fundamentally remove the causes of accidents on their products, the relevant companies should strengthen the activities to increase product safety. They shall cooperate with suppliers to arrange the measures to speedily secure safety of consumers.

A Study on Zero Trust Technology Trends (제로 트러스트 기술 동향에 관한 연구)

  • Miyeon Kim;DaeGyeom Kim;Jong-Min Jang;Sang-Jun Park;Souhwan Jung;Jungsoo Park
    • Smart Media Journal
    • /
    • v.12 no.2
    • /
    • pp.15-26
    • /
    • 2023
  • Due to the global COVID-19 pandemic, which has led to a shift towards remote work, the frequency of external access to important internal resources by companies has increased exponentially, exposing them to various security threats. In order to address these access security issues, ZTA (Zero Trust Architecture) has gained attention. ZTA operates on the principle of not trusting external or internal users, and manages access authentication and authorization strictly according to pre-established policies. This paper analyzes the definition of ZTA and key research trends, and summarizes different ZTA solutions for each company.